Proposing Host-Based Intruder Detector and Alert System (HIDAS) for Cloud Computing

  • Conference paper
  • First Online:
Proceedings of International Conference on Communication and Artificial Intelligence

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 192))

  • 413 Accesses

Abstract

The use of online applications is increasing regularly, and during this COVID-19 pandemic, its usefulness is envisaged to all of us. Data sharing either in the form of text, videos, or audio is the main requirement for online meeting or discussions, and during COVID-19 pandemic, most of the meetings like business, learning, presentation, or other types from private business sector to government are done through online applications. These applications are accessible through Internet from devices like mobile devices, laptops, palmtops, or desktop computers. Now, with the use of these online meeting and data sharing applications, the need of data security also increases. During this COVID-19, the activities of intruder in online applications have been noticed more than before. IDS solutions provide security against such problems. The IDS solutions are categorized into two categories according to their nature of work: (i) The Network-based Intruder Detection Systems (NIDS) and (ii) The Host-based Intruder Detection System (HIDS). In this paper, we are proposing a model Host-based Intruder Detection and Alert System (HIDAS) for securing the data and applications from such intruder attacks for public cloud computing H machines.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Roschke S, Cheng F, Meinel C (2009) An extensible and virtualization-compatible ids management architecture, 2:130–134

    Google Scholar 

  2. Modi C, Patel D, Borisaniya B, Patel H, Patel A, Rajarajan M (2013) A survey of intrusion detection techniques in cloud. J Netw Comput Appl 36(1):42–57

    Article  Google Scholar 

  3. Mazzariello C, Bifulco R, Canonico R (2010) Integrating a network id into an open source cloud computing environment, pp 265–270

    Google Scholar 

  4. Jones AK, Sielken RS (2000) Computer system intrusion detection: a survey. Computer Science Technical Report, pp 1–25

    Google Scholar 

  5. Lo C-C, Huang C-C, Ku J (2010) A cooperative intrusion detection system framework for cloud computing networks. pp 280–284

    Google Scholar 

  6. Garfinkel T, Rosenblum M et al (2003) A virtual machine introspection-based architecture for intrusion detection. 3:191–206

    Google Scholar 

  7. Aborujilah A, Musa S (2016) Critical review of intrusion detection systems in cloud computing environment. In: 2016 international conference on information and communication technology (ICICTM).

    Google Scholar 

  8. Aryachandra AA, Arif YF, Anggis SN (2016) Intrusion detection system (IDS) server placement analysis in cloud computing. 2016. In: 4th international conference on information and communication technology (ICoICT)

    Google Scholar 

  9. Chiba Z, Abghour N, Moussaid K, El Omri A, Rida M (2016) A survey of intrusion detection systems for cloud computing environment. In: 2016 international conference on engineering & MIS (ICEMIS)

    Google Scholar 

  10. Yasir M, Shibli MA, Umme H, Rahat M (2013) Intrusion detection system in cloud computing: challenges and opportunities. In: 2nd national conference on information assurance (NCIA), ,pp 59–66

    Google Scholar 

  11. Modi CN, Patel DR, Patel A, Rajarajan M (2012) Integrating signature Apriori based network intrusion detection system (NIDS) in cloud computing. In: 2nd international conference on communication, computing and security, pp 905–912

    Google Scholar 

  12. Alharkan T, Martin P (2012) IDSaaS: intrusion detection system as a service in public clouds, In: Proceedings of the 12th IEEE/ACM international symposium on cluster, cloud and grid computing (CCGrid), pp 686–687

    Google Scholar 

  13. Manthira SM, Rajeswari M (2014) Virtual host based intrusion detection system for cloud. Int J Eng Technol (IJET) 5:5023–5029

    Google Scholar 

  14. Khatri JK, Khilari G (2015) Advancement in virtualization based intrusion detection system in cloud environment. Int J Sci Eng Technol Res (IJSETR) 4:1510–1514

    Google Scholar 

  15. Gupta S, Kumar P (2015) Immediate system call sequence based approach for detecting malicious program executions in cloud environment. Wireless Pers Commun 81:405–425

    Article  Google Scholar 

  16. Pandeeswari N, Kumar G (2015) Anomaly detection system in cloud environment using fuzzy clustering based ANN, Mobile networks and applications, pp. 1–12

    Google Scholar 

  17. Muthukumar B, Rajendran PK (2015) Intelligent intrusion detection system for private cloud environment. Commun Comput Inf Sci 536:54–65

    Google Scholar 

  18. Modi CN, Patel D (2013) A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing. In: IEEE symposium on computational intelligence in cyber security (CICS), pp 23–30

    Google Scholar 

  19. Ghosh P, Mandal AK, Kumar R (2015) An efficient network intrusion detection system. In: Chapter information systems design and intelligent applications, vol. 339 of the series Advances in Intelligent Systems and Computing, pp 91–99

    Google Scholar 

  20. Ambikavathi C, Srivatsa SK (2015) Improving virtual machine security through intelligent intrusion detection system. Indian J Comput Sci Eng (IJCSE) 6:39

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Kumar Chaturvedi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chaturvedi, A.K., Kumar, P., Sharma, K. (2021). Proposing Host-Based Intruder Detector and Alert System (HIDAS) for Cloud Computing. In: Goyal, V., Gupta, M., Trivedi, A., Kolhe, M.L. (eds) Proceedings of International Conference on Communication and Artificial Intelligence. Lecture Notes in Networks and Systems, vol 192. Springer, Singapore. https://doi.org/10.1007/978-981-33-6546-9_55

Download citation

  • DOI: https://doi.org/10.1007/978-981-33-6546-9_55

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-33-6545-2

  • Online ISBN: 978-981-33-6546-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation